Secure multi-party computation

Results: 221



#Item
211Cryptographic protocols / Secure multi-party computation / Trusted Computing / Information privacy / Privacy / Internet privacy / Statistical database / Secure two-party computation / Vulnerability / Cryptography / Computer security / Ethics

Report on DIMACS∗ Working Group on Challenges for Cryptographers in Health Data Privacy Date of working group meeting: June 30, 2004 Working Group Organizers: Benny Pinkas, HP Labs Kobbi Nissim, Microsoft Research

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2004-08-16 11:11:48
212Wireless sensor network / Privacy / Secure multi-party computation / Internet privacy / Ethics / Data analysis / Data mining

PDF Document

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2009-12-18 08:12:17
213YAK / Secure two-party computation / Secure multi-party computation / Communications protocol / Oblivious transfer / Cryptographic protocols / Data / Information

Automatic Generation of Two-Party Computations (Extended Abstract) Philip MacKenzie∗

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2004-10-23 17:30:48
214Silvio Micali / Verifiable secret sharing / Secure multi-party computation / Zero-knowledge proof / Index of cryptography articles / Noisy-storage model / Cryptography / Cryptographic protocols / Oblivious transfer

Cryptography and Mechanism Design M o n i Naor* Dept. of Computer Science and Applied Math

Add to Reading List

Source URL: www.tark.org

Language: English - Date: 2011-10-23 10:31:50
215Internet privacy / Computer law / Crypto-anarchism / Secure multi-party computation / Privacy / Cypherpunk / Cryptography / Ethics / Cryptographic protocols

On the Horizon Editors: Alessandro Acquisti, [removed] | Hugh Thompson, [removed]

Add to Reading List

Source URL: randomwalker.info

Language: English - Date: 2013-11-14 23:45:25
216Trusted third party / Trusted Computing / Secure multi-party computation / Secret sharing / ACM SIGACT / Trusted timestamping / Verifiable secret sharing / Threshold cryptosystem / Secure two-party computation / Cryptography / Cryptographic protocols / Public-key cryptography

Distributed Computing Column 50 Distributing Trusted Third Parties, Innovation Prize, and SIROCCO Review

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2013-05-16 05:06:00
217Homomorphic encryption / Paillier cryptosystem / Secure multi-party computation / XTR / ElGamal encryption / Cryptography / Public-key cryptography / Cryptographic protocols

Journal of Computational Information Systems 7: [removed]1923 Available at http://www.Jofcis.com

Add to Reading List

Source URL: www.jofcis.com

Language: English - Date: 2011-06-03 01:07:59
218Secure multi-party computation / Access structure / Secret sharing / Entailment / Public-key cryptography / Monotone / Sheaf / Cryptography / Cryptographic protocols / Oblivious transfer

Generalized Oblivious Transfer by Secret Sharing Tamir Tassa ∗

Add to Reading List

Source URL: www.openu.ac.il

Language: English - Date: 2010-03-21 09:09:10
219Data / Econometrics / Regression analysis / Synthetic data / Database management systems / Data mining / Database / Record linkage / Secure multi-party computation / Statistics / Data management / Information

PDF Document

Add to Reading List

Source URL: nisla05.niss.org

Language: English - Date: 2004-08-30 09:40:44
220Secure two-party computation / Information-theoretic security / Homomorphic encryption / Public-key cryptography / Quantum cryptography / Cryptographic primitive / Noisy-storage model / Universal composability / Cryptography / Cryptographic protocols / Secure multi-party computation

PDF Document

Add to Reading List

Source URL: u.cs.biu.ac.il

Language: English - Date: 2011-04-04 06:52:20
UPDATE